Search results for "020201 artificial intelligence & image processing"

showing 10 items of 1827 documents

Towards Risk-aware Access Control Framework for Healthcare Information Sharing

2018

business.industryComputer scienceInformation sharingInternet privacyHealth care0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processingAccess control02 engineering and technologybusinessProceedings of the 4th International Conference on Information Systems Security and Privacy
researchProduct

High Level Modeling and Hardware Implementation of Image Processing Algorithms Using XSG

2019

International audience; Design of Systems-on-Chip has become very common especially with the remarkable advances in the field of high-level system modeling. In recent years, Matlab also offers a Simulink interface for the design of hardware systems. From a high-level specification, Matlab provides self-generation of HDL codes and/or FPGA configuration codes while providing other benefits of easy simulation. In addition, a large part of the Systems-on-Chip use at least one image processing algorithm and at the same time border detection is one of the most used algorithms. This paper presents a study and a hardware implementation of various algorithms of borders detection realized under Xilin…

business.industryComputer scienceInterface (computing)[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR]020207 software engineeringImage processing02 engineering and technologySystems modelingEdge detection[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]VHDLDigital image processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMATLABField-programmable gate arraycomputerComputer hardwarecomputer.programming_language
researchProduct

An Innovative Similarity Measure for Sentence Plagiarism Detection

2016

We propose and experimentally assess Semantic Word Error Rate (SWER), an innovative similarity measure for sentence plagiarism detection. SWER introduces a complex approach based on latent semantic analysis, which is capable of outperforming the accuracy of competitor methods in plagiarism detection. We provide principles and functionalities of SWER, and we complement our analytical contribution by means of a significant preliminary experimental analysis. Derived results are promising, and confirm to use the goodness of our proposal.

business.industryComputer scienceLatent semantic analysisPlagiarism DetectionComputer Science (all)Sentence similarity measureWord error rate02 engineering and technologySimilarity measurecomputer.software_genreComplement (complexity)Theoretical Computer SciencePlagiarism detection020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPlagiarism detectionArtificial intelligenceSentence Similarity MeasurebusinesscomputerNatural language processingSentencePlagiarism detection; Sentence similarity measure; Theoretical Computer Science; Computer Science (all)
researchProduct

Introducing the Concept of Hyperactivity in Multi Agent Systems

2013

International audience; Software Agents are no longer the simple communication gateways for devices to interconnect using one or more networks. With Multi Agent Systems contributing in a wide spectrum of intelligent systems, the Agents are in a more proactive role than just being responsible for passing messages between their respective base systems. Agent Relation Charts and the Hyperactive Transaction Model in general is one of the recent attempts of developing a multi-view design model for Multi Agent Systems. The model has made a clear distinction in the regular and intelligent activities of an agent. Based on these differences, the agents are classified into three main categories named…

business.industryComputer scienceMulti-agent systemAutonomous agentIntelligent decision support system020207 software engineering02 engineering and technologycomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEAgent-based social simulationIntelligent agent[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]Belief–desire–intention software modelSoftware agentHuman–computer interaction[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessAgent architecturecomputer
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

The Influence of Requirements in Software Model Development in an Industrial Environment

2017

Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…

business.industryComputer scienceProcess (engineering)Level of detail (writing)020207 software engineering02 engineering and technologyElectronic mailSoftware0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingSoftware requirementsSoftware engineeringbusinessSoftware measurementNatural language2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Experimental Characterization of Mobile Fading Channels Aiming the Design of Non-Wearable Fall Detection Radio Systems at 5.9 GHz

2016

One of the major concerns for the independent living of elderlies is a fall incident. To decrease human interaction errors and user privacy concerns of existing fall detection systems, a new generation of fall detection systems is emerging. The new trend is to design non-wearable devices that can monitor the physical activities of the home user using radio waves reflected off the body. This paper reports an in-home radio measurement campaign at 5.9 GHz, which has been conducted to study the impacts of different physical activities of the user, including fall incidents, on the channel transfer function (CTF) and the power delay profile (PDP) of indoor mobile radio channels. The home is equip…

business.industryComputer scienceReal-time computingElectrical engineeringWearable computer020206 networking & telecommunicationsDifferential (mechanical device)02 engineering and technology0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingFadingbusinessPower delay profileRadio waveCommunication channel
researchProduct

On the Generalizability of Programs Synthesized by Grammar-Guided Genetic Programming

2021

Grammar-guided Genetic Programming is a common approach for program synthesis where the user’s intent is given by a set of input/output examples. For use in real-world software development, the generated programs must work on previously unseen test cases too. Therefore, we study in this work the generalizability of programs synthesized by grammar-guided GP with lexicase selection. As benchmark, we analyze proportionate and tournament selection too. We find that especially for program synthesis problems with a low output cardinality (e.g., a Boolean output) lexicase selection overfits the training cases and does not generalize well to unseen test cases. An analysis using common software metr…

business.industryComputer scienceSoftware developmentGenetic programming02 engineering and technologyMachine learningcomputer.software_genreTournament selectionSoftware metricTest case020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryArtificial intelligencebusinesscomputerSelection (genetic algorithm)Program synthesis
researchProduct